Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Business

Validating The Technostress Instrument Using A Sample Of Chinese Knowledge Workers, Leida Chen Jan 2015

Validating The Technostress Instrument Using A Sample Of Chinese Knowledge Workers, Leida Chen

Journal of International Technology and Information Management

Today, the phenomenon of technostress is both pervasive and global. Nevertheless, research efforts, especially empirical and cross culture studies, in this domain have been very limited. In addition, lack of consistency in the technostress measure found in existing literature made it difficult to build a unified body of knowledge of technostress. Using a sample of 221 Chinese knowledge workers, this study cross-validated and refined the technostress measure developed by Tarafdar et al. (2007). It was found that the instrument offered high validity and reliability after some respecification in the Chinese context. Technostress experienced by Chinese knowledge workers was investigated and …


Nosql Database Technologies, Michael Madison, Mark Barnhill, Cassie Napier, Joy Godin Jan 2015

Nosql Database Technologies, Michael Madison, Mark Barnhill, Cassie Napier, Joy Godin

Journal of International Technology and Information Management

As cloud computing continues to evolve, organizations are finding new ways to store the massive amounts of big data that are collected. Big data storage often require greater flexibility and scalability which can be provided by incorporating NoSQL technologies. NoSQL (Not Only SQL) is quickly becoming a popular approach to store large and unstructured data. This paper looks at the various classifications of NoSQL technologies as well as many of the notable characteristics of the technologies. The authors also describe some deficiencies of using NoSQL and give some explanation to why companies are adopting the technology. The paper concludes with …


Implications Of Perceived Utility On Individual Choice And Preferences: A New Framework For Designing Recommender System, Gunjan Tomer Jan 2015

Implications Of Perceived Utility On Individual Choice And Preferences: A New Framework For Designing Recommender System, Gunjan Tomer

Journal of International Technology and Information Management

Consumer psychology and consumer behaviour has constantly been a field of interest for the researchers. Volumes of researches are available in this area, still new theories and concepts keep emerging in response to change in context and environment. Consumer psychology has large cross disciplinary implications. In this paper, a relationship between consumer psychology and recommender system has been explained and how implementing a consumer psychology model can improve recommender system performance. This paper also gives first level analysis of various filters that can be developed along with the design of recommender system in order to generate a more refined and …


Business Processes Management In The Netherlands And Portugal: The Effect Of Bpm Maturity On Bpm Performance, Kevin J. Janssen, Pascal Ravesteyn Jan 2015

Business Processes Management In The Netherlands And Portugal: The Effect Of Bpm Maturity On Bpm Performance, Kevin J. Janssen, Pascal Ravesteyn

Journal of International Technology and Information Management

In the last decade, business process management (BPM) has become essential for corporations to maintain their control over business processes. Therefore it is highly important for companies to know which factors influence business process performance. Consequently, this study focuses on the relationship between BPM maturity and BPM performance. The paper aims to determine (1) whether BPM maturity has a significant effect on BPM performance and (2) whether there is a significant difference between a country that is in a relatively more mature stadium with regard to BPM practices and one that is still going through an adapting phase. In this …


Factors Influencing Online Shopping During Diwali Festival 2014: Case Study Of Flipkart And Amazon.In, Preeti Khanna, Brinda Sampat Jan 2015

Factors Influencing Online Shopping During Diwali Festival 2014: Case Study Of Flipkart And Amazon.In, Preeti Khanna, Brinda Sampat

Journal of International Technology and Information Management

The Indian retail sector is witnessing a dramatic change because of changing mindset of the urban consumers. These consumers are spoilt for choices and are presented not only with different products and brands but also with diverse retailer formats such as departmental stores, specialty stores, and online shopping platforms. The prospect of online shopping is increasing in India because of many factors such as increased Internet literacy, perceived usefulness, ease of use, increased number of working women, entry from the global and local participants, and the increased visibility of online players, to name a few. E-tailing is the process of …


An Innovative Clustering Approach To Market Segmentation For Improved Price Prediction, Donghui Shi, Jian Guan, Jozef Zurada, Alan S. Levitan Jan 2015

An Innovative Clustering Approach To Market Segmentation For Improved Price Prediction, Donghui Shi, Jian Guan, Jozef Zurada, Alan S. Levitan

Journal of International Technology and Information Management

A main obstacle to accurate prediction is often the heterogeneous nature of data. Existing studies have pointed to data clustering as a potential solution to reduce heterogeneity, and therefore increase prediction accuracy. This paper describes an innovative clustering approach based on a novel adaptation of the Fuzzy C-Means algorithm and its application to market segmentation in real estate. Over 15,000 actual home sales transactions were used to evaluate our approach. The test results demonstrate that the accuracy in price prediction shows notable improvement for some clustered market segments. In comparison with existing methods our approach is simple to implement. It …


Perceptions And Use Of Anonymous Communication Across Cultures, Guido Lang, Tamilla Mavlanova Jan 2015

Perceptions And Use Of Anonymous Communication Across Cultures, Guido Lang, Tamilla Mavlanova

Journal of International Technology and Information Management

We use social networks to communicate, keep in touch and express our opinions in a manner that has become completely ubiquitous. However, this very ubiquity and ease of expression have exposed another, contentious side – one where nobody can remain completely anonymous for long and where every conversation is stored in perpetuity. Some fear that the ephemeral quality of a social interaction has been lost, which threatens our right to be forgotten and freedom of expression. In this paper, we look at why people engage in anonymous communication, and if there is a perceived need for legal protection of anonymous …


Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku Jan 2015

Factors Influencing Students’ Attitudes To Computer Utilization In Tertiary Institutions: An Exploratory Study, Samuel A. Ejiaku

Journal of International Technology and Information Management

Students today need to have computer knowledge and skills to enable them perform their task at school and their jobs. This presents a challenge to universities on how to provide computer education to their students. This challenge is even more critical for students in developing countries. Few studies have been done on attitude of students’ use of computers in a university environment using a well-grounded technology acceptance mode. The purpose of this study is to find the factors that influence student attitude in the acceptance and use of computers in tertiary institutions in emerging economies using the Theory of Planned …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Do National Culture And Organizational Development Affect The Effectiveness Of Erp Implementation? A Tale Of Two Cultures: Us Versus China, Wing M. Fok, Lillian Y. Fok, Jing Li Jan 2015

Do National Culture And Organizational Development Affect The Effectiveness Of Erp Implementation? A Tale Of Two Cultures: Us Versus China, Wing M. Fok, Lillian Y. Fok, Jing Li

Journal of International Technology and Information Management

As many US and European companies have implemented Enterprise Resource Planning (ERP) Systems, most of the previous implementation studies have tended to focus on companies from more developed countries. This research points out that there is need for academics and practitioners to “take stock,” to examine what is happening in broad terms across organizations in the ERP implementation process, and to consider whether cultural differences in the U.S. when compared to another culture can impact the process. In this study, we are concerned with several issues surrounding current ERP implementation status and report initial findings from managers in a wide …


Conceptual Model For Successful Implementation Of Big Data In Organizations, Mohanad Halaweh, Ahmed E. Massry Jan 2015

Conceptual Model For Successful Implementation Of Big Data In Organizations, Mohanad Halaweh, Ahmed E. Massry

Journal of International Technology and Information Management

The term ‘big data’ has gained huge popularity in recent years among IT professionals and academicians. Big data describes the massive amount of data that can be processed and analyzed using technology to gain business values that will help organizations to achieve competitive advantages. The current paper aims to develop a holistic model that includes the factors that would affect the success or failure of the implementation of big data in organizations. Furthermore, this research examines the opportunities that organizations would attain from implementing big data, as well as the challenges that could hinder this implementation. The proposed model provides …


Lee Manufacturing Control, Asset Tracking, And Asset Maintenance: Assessing The Impact Of Rfid Technology Adoption, Abubaker Haddud, John C. Dugger, Huei Lee Jan 2015

Lee Manufacturing Control, Asset Tracking, And Asset Maintenance: Assessing The Impact Of Rfid Technology Adoption, Abubaker Haddud, John C. Dugger, Huei Lee

Journal of International Technology and Information Management

The purpose of this study was to study the relationship between RFID technology and lean manufacturing. More specifically, the identification of implementation areas where RFID can have the greatest impact on manufacturing control, manufacturing asset tracking, and asset maintenance in a lean manufacturing environment. A survey was used to collect data from participants working in seven U.S. manufacturing industries. Questions addressed the use of RFID in manufacturing control, asset tracking, and asset maintenance. The survey items were directly related to the following manufacturing wastes: overproduction, waiting time, inefficient transportation, inappropriate processing, unnecessary inventory, unnecessary motion, and rejects and defects. An …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Optimizing Data Management With Disparities In Data Value, G. Shankaranarayanan, Adir Even, Paul D. Berger Jan 2015

Optimizing Data Management With Disparities In Data Value, G. Shankaranarayanan, Adir Even, Paul D. Berger

Journal of International Technology and Information Management

When there is a disparity in the value of different data records and fields, there is a need for an optimization of data resources. Not all data necessarily contribute the same value. It depends on the usage of the data, as well as a variety of other factors. This paper presents models for optimizing data management in the presence of a disparity between the values contributed by different data. We expound on what disparity of data value represents and illustrate models to derive a numerical measure of such disparity. We then use real-world data from a large data resource used …


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


Mobile App Installation: The Role Of Precautions And Desensitization, Mark A. Harris, Amita Goyal Chin, Robert Brookshire Jan 2015

Mobile App Installation: The Role Of Precautions And Desensitization, Mark A. Harris, Amita Goyal Chin, Robert Brookshire

Journal of International Technology and Information Management

The purpose of this research is to investigate precautions that consumers take before installing mobile apps and consumer’s potential desensitization to excessive app permission requests. Through a survey of 209 participants, a prediction model was created that attempts to predict whether respondents would download applications asking for excessive permissions. The model results indicate those that take more precautions are less likely to download apps requesting excessive permissions. However, the precautions taken by participants may be inadequate and may leave consumers with a false since of security. Another key finding with the support of Communication Theory and the C-HIP Model is …


Comparing Mobile Apps Usability Characteristics For Designers And Users, Teuta Cata, Ben Martz Jan 2015

Comparing Mobile Apps Usability Characteristics For Designers And Users, Teuta Cata, Ben Martz

Journal of International Technology and Information Management

As the mobile device market grows, so grows the commercial market and therefore the subsequent development of applications for this medium. As this rush to develop apps continues to grow, the search continues for what characteristics will help mobile apps be adopted and continued to be used. This exploratory study looks to see if there are differences between how users of mobile applications and developers of mobile applications perceive these characteristics. The results of our study identified areas of statistically significant differences on key design characteristics between mobile application designers with mobile applications users. More interestingly, a detailed analysis found …


Revisit The Classification Of General Purpose Technologies (Gpts) In Corporate Innovation Research Using Patent And Patent Citation Data, Ranfeng Qiu, John Catwell Jan 2015

Revisit The Classification Of General Purpose Technologies (Gpts) In Corporate Innovation Research Using Patent And Patent Citation Data, Ranfeng Qiu, John Catwell

Journal of International Technology and Information Management

Information and Communication Technologies (ICTs) have been recognized as a type of General Purpose Technologies (GPTs), and thus are considered t h e “driving force” in corporate technology advance. In this study, we re-conceptualize and re-classify GPTs from a broad field- based approach, based on a two-dimensional construct using patent and patent citation data. The new construct makes connections of ICTs with other technology fields. The new approach takes into considerations that firms are not only “users” but also “innovators” of new technologies. The research results in this paper will serve as a platform based upon which more studies on …


The State Of Cryptocurrencies, Their Issues And Policy Interactions, Ramesh Subramanian, Theo Chino Jan 2015

The State Of Cryptocurrencies, Their Issues And Policy Interactions, Ramesh Subramanian, Theo Chino

Journal of International Technology and Information Management

This paper focuses on the evolution of cryptocurrencies. It traces the history of early cryptography, the ‘cypherpunk’ movement, and how the work of some cyber libertarians and cryptographers enabled the emergence of popular cryptocurrencies. The paper then focuses on Bitcoin. It delves into the technology behind the Bitcoin architecture and shows how exactly this technology works. The paper then does an analysis of security and regulatory considerations that affect the growth of Bitcoin-based businesses. The paper concludes with some suggestions for future work in the area.


Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen Jan 2015

Effects Of Exchange Benefits, Security Concerns And Situational Privacy Concerns On Mobile Commerce Adoption, Hua Dai, Yan Chen

Journal of International Technology and Information Management

Few empirical studies have examined both privacy and security concerns in the context of mobile commerce (m-commerce) while accounting for the effects of situational privacy concerns specific to the context of m-commerce. This research fills this gap in research by exploring users’ exchange perceptions specific to the context of m-commerce in China and by examining the inhibitors and drives of m-commerce adoption in China from the perspectives of social exchange. Particularly, this research develops an integrated research model in which users’ perceptions on value added of and usefulness of m-commerce, and users’ privacy concerns and security concerns of m- commerce …


The Innovation Value Chain And Adaptability Of Organizations, Jakobus Smit Jan 2015

The Innovation Value Chain And Adaptability Of Organizations, Jakobus Smit

Journal of International Technology and Information Management

This paper reports on a study of adaptability of organizations and how that relates to their ability to generate innovations. Constructs from an organizational culture model and the innovation value chain was used as the foundation for a cross-sectional study in 7 organizations in Ireland. The findings reveal that adaptability is indeed related to innovativeness. Organizations that are good at creating change, learning, and creativity are better able to generate new ideas. In addition organizations that are also flexible can convert these ideas into outputs and subsequently disseminate them internally as well as outside the organization.


Changing Business Process Management In Project Development, Debby Goedknegt Jan 2015

Changing Business Process Management In Project Development, Debby Goedknegt

Journal of International Technology and Information Management

The construction sector is in transition. All related manufacturing industries face the challenge to improve the processes within the whole sector. Building Information Modelling (BIM) could be a tool to make production and control chains more efficient (Verbaan, 2013). The question that is being answered her is: What are the business enabling capabilities regarding efficiency and effectivity of BIM in the domain of project development in the built environment for architects and project developers in the context of the current reality of the Dutch built environment? The answer to this question is found through literature research. These findings were validated …


Cognitive Negotiation Schemata In The It Industries Of Japan And Finland, William W. Baber, Arto Ojala Jan 2015

Cognitive Negotiation Schemata In The It Industries Of Japan And Finland, William W. Baber, Arto Ojala

Journal of International Technology and Information Management

The existing literature emphasizes the importance of negotiation skills in the field of IT. However, negotiation and negotiation styles in the IT industry have received limited attention. This original empirical research compares the negotiation schemata of Finnish and Japanese IT business people. The study identifies negotiation schemata used in one or both culture groups. Negotiators with greater experience and power in the negotiation process command more schemata. However, neither population enjoys the full range of negotiation schemata. Business negotiators in or out of IT and these cultures may benefit from knowing the schemata and the results of matching and mismatching.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


An Adaptive Neuro-Fuzzy System With Semi-Supervised Learning As An Approach To Improving Data Classification: An Illustration Of Bad Debt Recovery In Healthcare, Donghui Shi, Jozef Zurada, Jian Guan, Sandeep Goyal Jan 2015

An Adaptive Neuro-Fuzzy System With Semi-Supervised Learning As An Approach To Improving Data Classification: An Illustration Of Bad Debt Recovery In Healthcare, Donghui Shi, Jozef Zurada, Jian Guan, Sandeep Goyal

Journal of International Technology and Information Management

Business analytics has become an increasingly important priority for organizations today as they strive to achieve greater competitiveness. As organizations adopt business practices that rely on complex, large-scale data, new challenges also emerge. A common situation in business analytics is concerned with appropriate and adequate methods for dealing with unlabeled data in classification. This study examines the effectiveness of a semi-supervised learning approach to classify unlabeled data to improve classification accuracy rates. The context for our study is healthcare. The healthcare costs in the U.S. have risen at an alarming rate over the last two decades. One of the causes …


Information And Communication Technologies (Ict): Components, Dimensions, And Its Correlates, Alexander N. Chen, J. Gabriel Dominguez Castillo, Katherine Ligon Jan 2015

Information And Communication Technologies (Ict): Components, Dimensions, And Its Correlates, Alexander N. Chen, J. Gabriel Dominguez Castillo, Katherine Ligon

Journal of International Technology and Information Management

Information and Communication Technologies (ICT) has been identified as one of the crucial factors that affect teaching effectiveness and student learning worldwide. UNESCO, many international organizations, and many governments emphasized the importance of ICT and try to incorporate ICT into education systems. This study examined self-assessed computer competency in thirteen ICT areas from two samples, e.g., the United States and Mexico. Reliability tests were conducted, and rank analysis was done among them. By using factor analysis, these thirteen areas were grouped into three categories: “basic ICT skills”; “advanced ICT skills;” and “multimedia skills and attitudes towards ICT”. Subjects showed the …


Long Term Factors Of Internet Diffusion In Sub-Saharan Africa: A Panel Co- Integration Analysis, Vasudeva N. R. Murthy, Ravi Nath, Mina Soleimani Jan 2015

Long Term Factors Of Internet Diffusion In Sub-Saharan Africa: A Panel Co- Integration Analysis, Vasudeva N. R. Murthy, Ravi Nath, Mina Soleimani

Journal of International Technology and Information Management

Identifying factors that influence the diffusion of the Internet is paramount for researchers as well as policy makers in articulating strategies to improve the availability and subsequent use of the Internet. Most existing empirical studies have focused on this problem by analyzing diffusion data for countries for one fixed year and identified variables affecting the Internet diffusion. These variables, generally, come from the economic, technological, policy, culture, and human capital realms. These results have provided a good “snapshot” of what factors are important towards the diffusion of the Internet and the results tend to vary for studies conducted in different …


Ethical Hacking Pedagogy: An Analysis And Overview Of Teaching Students To Hack, Regina D. Hartley Jan 2015

Ethical Hacking Pedagogy: An Analysis And Overview Of Teaching Students To Hack, Regina D. Hartley

Journal of International Technology and Information Management

An area that is being scrutinized as a more effective method of educating and preparing security professionals is that of ethical hacking. The purpose of this research is to examine a more proactive approach to adequately prepare future information security professionals. Future careers in security may require that professionals be equipped with the necessary skill sets to combat an ever-growing presence of unwanted activity throughout the Internet. Many argue that future information security professionals need to have the same skill sets as attackers in order to adequately recognize and defend networks from intrusion. This research defines ethical hacking and examines …